The site is down for me. I haven't been able to access the page for a couple weeks now.
I'd suggest trying a vps or torAlternatively, if you can find a way to change the dns server your browser uses by default.
|
|
|
Address is signed and has all the information necessary. The address is quite new, as it is only 8 months old, however, it'll probably still get accepted as it's old enough...
You might just have to wait for it now though... Theymos is quite busy with these types of requests.
Okay, thanks! If my question is not resolved for a long time, who can I contact? You'll just have to pm theymos again in a few months...
|
|
|
Address is signed and has all the information necessary. The address is quite new, as it is only 8 months old, however, it'll probably still get accepted as it's old enough...
You might just have to wait for it now though... Theymos is quite busy with these types of requests.
|
|
|
We probably can't help very much other than determining if the message you sent to theymos is one that looks like it wil get accepted (as in it follows all of the rules on the sticky about account recovery).
What should I do for this? Copy it here or send you a private message? Whichever you prefer. You could post a signed message here and PM me what you actually sent if you want your email protecting.
You'd need to post a signed staked address/public key from that account. If you haven't done this, this is why theymos won't recover your account.
|
|
|
Who advised you to make the topic.
We probably can't help very much other than determining if the message you sent to theymos is one that looks like it wil get accepted (as in it follows all of the rules on the sticky about account recovery).
|
|
|
~snip~
Is there a reason you're advertising what looks like a blatant ponzi in your signature? Looks a lot like the promises of other sites like terabox dot me for example.
|
|
|
Theymos has changed a few peoples' usernames. I think a user I knew as Izanagi had his name changed (as there is no user under that name anymore).
Also some custom titles have been changed for moderators before now but that's not usernames.
Remember this: It's not about the name, it's about how well you post.
|
|
|
If someone was good enough at it, they'd use different addresses/IPs per block so it'd be almost impossible to trace that the network is being attacked before the old chain gets rejected and lost. The increased number of blocks in a shorter amount of time would go noticed however. (As the block difficulty takes 2016 blocks to change). There's also the issue that there might be a sustained 51% hashrate by a pool before anyone notices they're doing something unusual. And this is really off topic now.
|
|
|
I can fund this, with the understanding that if the collateral drops below the value of Bitcoin initially lent, I will sell it.
|
|
|
I'm getting mixed signals. https://enforum.bitmain.com/bbs/topics/4014 - says no but they asked them quite while ago. It was also asked here somewhere [according to a google search] and the S2s apparently came with a psu.
|
|
|
You prefer to use an desktop wallet on an online device because you are afraid that some hacker would have access to postal service? You are deciding about your safety based on your personal feelings, not rationally.
Your postal service attacker would need to: - stole your hardwallet from the postal service - installed a malware on the device - gave it back to the postal service without being noticed - then the postal service delivered the hardwallet to you. - you installed the hardware wallet AND you didn´t update the firmware before using
What about customs. A chief cunstable decides they want to find packets with bitcoin hardware wallets in it and replace them with ones similar in order to make a quick amount of money. What about ledger themselves, they could throw in a few issues with their wallet to steal funds (do it to about 0.1% of packages and it won't rise up very mcuh suspicion). You are saying that this attack is more probable to happen then your daily online desktop get infected?
My online computer didn't get hacked either. So both are as unlikely to happen, it's safer to airgap a client though and easier than to get a hardware wallet. This is why I said this kind of discussion is useless. Because its not based on rational arguments, but feelings.
I saw other thread about this already, where a guy said that using a bitcoin core client on a daily computer was safer then using ledger nano, because ledger nano was vulnerable to the "evil maid attack". Well, a desktop wallet and even an airgapped pc is vulnerable to this "evil super hacker cryptographer maid attack". I just don´t get why someone so intelligent and with all that knowledge is working as a maid cleaning bathrooms lol
Well that's an obvious truth. A laptop looks like a harmless and innocent device that could have been used for anything. A ledger nano is quite clearly a bitcoin wallet and it's a bit easier to steal than a computer. Slip it into their pocket and away they go. The maid stuff could be a hobby waiting for a wealthy bitcoin investor to drop their ledger drive in their room somewhere or they could be trafficked into that country to work as a maid and are trying to get their freedome (stealing $100 is probably fine in that circumstance but not a drive with $20000+ on it).
Meanwhile the topic in question is on antivirus and not how likeley a maid is to steal your hardware wallet. You also have to write your seed down with a hardware wallet which is, in itself, a way the money could be taken.
|
|
|
I sent them a question through support asking if the hashnest s7 redemption units each come with a power supply or no
Please let me know if you guys found out anything
I might check their website and facebook/twitter to see if anything comes up. Let us know what the answer is, lets hope you get a reply before Friday!
|
|
|
I can say Deisik become the best poster, I think he/she will got accepted. The competition is real ![Cool](https://bitcointalk.org/Smileys/default/cool.gif) Can you stop posting for you alt?
|
|
|
Yes a sustained 51% attack could reverse old transactions. But it would have to be sustained for more than a day. People would notice it and take action to blacklist the attackers.
Theoretically, people would NOT notice that a 51% attack is ongoing. An attacker would mine on the private chain WITHOUT revealing it, until he decides to do so. Only at that point in time (when a new longest chain has been broadcasted and transactions of X blocks are mixed up (or just a few of these)) it is obvious that someone has been mining on a private chain with 51%+ of the hashrate. Additionally there is no 'blacklist'. It doesn't matter WHO shares the block. The network doesn't know from who the block came. As long it is a valid block, resulting in the longest chain, it is considered to be the (only) valid chain. This is exactly true, if they were clever enough to keep changing the address the block rewards go to then you might assume it is going to multiple people. With the pools at the moment, it's like if Bitmain didn't tell you they owned BTC.com and Antpool.com then you'd think those were two different miners, this is probably how a similar style of attack would go. Someone wouldn't say they owned 50%+ of hashpower as another miner maker would obviously want to resolve this (there are three major ones: Bitfury, Bitmain and BW afaik).
|
|
|
I think when the discussion reaches this point where people claim "hardware wallets are not safe" we are just going in circles.
Is that denial that hardware wallets are somehow now really safe. A lot of attacks have taken place in the past on them You are safe enough with a hardwallet. Using an airgapped pc may be better if you know what you are doing and you are very careful. No one could insert a pen drive or connect it to the internet (wifi or ethernet). There are many other things that you must be aware, careful and paranoid to have something close to 99% security even using an air gapped pc.
Even using a bank account and visa you can lose money, as they are not 100%.
They are insured though in quite a few countries. And yes it is best to use webcams as bob said but then you have to get two webcams that you use for only that and sometimes qr code scanner apps get a bit faulty (there's also the 1000 byte limit of QR codes). As far as I know ledger nano vulnerabilities happen when the attacker gets physical access to your device. If you bought from third party seller, you must consider it as a permanently compromised device. So always buy from the official retailer.
This is also reliant on your postal carriers and security officicals not changing anything on it's way to you. These two aren't entirely safe though.
Thats definitely true. I never intended to claim they are entirely safe. 100% safety and security does not exist. I just wanted to point out that using the 'best AV software' is not enough to keep funds safe, since OP seems to be wanting to secure his holdings. You'd still then need an antivirus. I managed to store 1.25 BTC when the price per bitcoin was $16000 without any issues in electrum on an online computer. Airgapping also means viruses can be transmitted through flash drives which can end up grabbing your code.
This is definitely a thinkable (but also less-probable) way of compromising an 'air-gapped' wallet. But the question is also whether you would consider such a system as truly air gapped. Replace the flash drives to transmit transactions with 2 webcams and you have one less attack vector. I am not saying this would be a perfect solution. It may still be possible to compromise this system with a buffer overflow in the screen capturing software (using the TX QR's to transmit data). The chance of getting compromised does always exist.. it just gets really really small. It is about how low the probability has to be until you can sleep good at night ![Grin](https://bitcointalk.org/Smileys/default/grin.gif) [/quote] And the two webcams idea seems good, but there is a 1000 byte limit to a lot of qr code scanners. Another idea of doing this would be using DVDs that you can just throw away afterwards as they're really cheap.
|
|
|
Anyway , the most secure and easier solution is buy a hardwallet, such as ledger nano.
This is important. You can have the best AV software and the 'best' habits using the web.. but (properly) self-coded malware will never be detected by AV software. And even if your system is always up-to-date (what you should definitely be looking for!), new vulnerabilities are discovered on a daily basis. Especially javascript/flash/pdf's are a pretty big security concern. You can never be completely safe on an system which is connected to the internet. For a real secured storage for your coins, choose a hardware wallet or an air-gapped storing solution. These two aren't entirely safe though. Don't rely on them for being able to do whatever you want to on the internet. There are stuff in trezor software especially that come up where there are vulnerabilities found inn old vertions of the software. Ledger, I think is a bit more secure, but you can never get total security. Airgapping also means viruses can be transmitted through flash drives which can end up grabbing your code. Even things like paper wallets can never be truly secure (a dice throw and a script running offline can fix some of these errors however, these are much more secure if your plan is to hodl instead of spend).
|
|
|
dot net is not our domain
Oh yeah oops. I can open site just fine on my side, try again it's fixed if you still can't open it, try changing your dns server to google dns
Yes it's fixed for me. That's a bit odd. Perhaps it was a short DDoS attack? The onion version being online would probably point to that being the case. It seems to be for quite a sort amount of time so we probably won't ever know whether it was a DDoS or not (if it was, we know they gave up very quickly).
|
|
|
Most paid for antiviruses do well. My preference is Norton by Symantec.
However, a lot of other users use McAfee, Avast and AVG.
I don't think there is a better one it's just down to your own preference, they all probably share databases anyway (or have access to each others' databases).
For free ones, I'd probably say malwarebytes is the most reliable.
If you get an antivirus, make it so it won't scan your blockchain folder (as it might corrupt it).
|
|
|
Thinking about it a bit more, could "" be both the regular wallet and the change addresses and the other is just main addresses. Note that the account "" is not the same as leaving the parameter out. The server total may be different to the balance in the default "" account.
i just type getbalance "*" it appears with 27002.00 i tried sending the full funds, with an error of insufficient funds. seems that the server has acknowledge this amount that has received amount on getbalance but not on getbalance "*" Have no idea how to solve this problem. Reduce the number of block confirmations to zero before spending and try again? Is it possible some of your transactions haven't yet confirmed, can you post your address (or pm it)?
|
|
|
Thinking about it a bit more, could "" be both the regular wallet and the change addresses and the other is just main addresses. Note that the account "" is not the same as leaving the parameter out. The server total may be different to the balance in the default "" account.
|
|
|
|